Attacks and countermeasures in multi-hop Cognitive Radio Networks

  • Authors:
  • Fei Hu;De-cun Dong;Yang Xiao

  • Affiliations:
  • Electrical and Computer Engineering, University of Alabama, Tuscaloosa, AL, USA.;Transportation Engineering Institute, Tongji University, Shanghai, 200331, PR China.;Department of Computer Science, University of Alabama, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Cognitive Radio Networks (CRNs), there are some new attacks. For instance, an attacker may modify the air interface of a CRN to mimic primary signal's characteristics, thereby causing legitimate Secondary Users (SUs) to erroneously identify the attacker as a Primary User (PU). Most CRNs rely on Common Control Channel (CCC) to allocate channels. An attacker can saturate CCC to make control message exchange difficult. This paper analyses attacks specific to CRN and the countermeasures. We will focus on anti-attack schemes of low layers, i.e., physical and MAC layers. We propose several enhancements to secure CRN.